An End-to-End email encryption program - Protects email at rest and in motion

Try for free now

The free trial period is 60 days after which no sending or receiving is possible unless a license is obtained. The stored emails can be viewed also after the trial period.

Superior protection for the real world

EndCryptor protects old encrypted emails - that were copied by an adversary when they traversed the internet - also then when the adversary gets current encryption keys by hacking into user's computer. The software automatically recovers from the attack when users exchange emails. The adversary will lose the ability to decrypt new emails.

Easy to use

No knowledge of cryptography is required. The user interface is similar to a typical email client. User's current email account is used to deliver the encrypted emails.

End-to-End Encryption

The email is encrypted at sender's computer and it can be decrypted only at true receiver's computer.

Quantum attack resistant

It may be possible that before the year 2030 there will be computers that can break current classical public keys. EndCryptor uses classical public keys and new quantum attack resistant public keys. Note that otherwise current encrypted traffic can be copied and decrypted by quantum computers when they become reality. USA's ‘NIST Internal Report NIST IR 8547 ipd’ states: 'even if quantum computers are a decade away, organizations must begin the migration to post quantum cryptography today to avoid having their encrypted data exposed once quantum computers become operational in the future. This threat, often referred to as “harvest now, decrypt later,” underscores the necessity of acting immediately...'

State of the art cipher and public keys

The implementation of symmetric encryption and classical and quantum attack resistant public keys uses publicly available source code developed by the scientists who designed the systems. Public key technology: classical: Curve25519, quantum attack resistant: Kyber-1024, FrodoKEM-1344 and mceliece6688128f (round 4). Kyber is an official standard of USA, the variants of Frodokem and Mceliece are recommended by Germany's Federal Office for Information Security, see BSI TR-02102-1. The public keys are used in a hybrid setup - this means that an adversary must be able to break all of them. Hybrid setup is used because quantum attack resistant technology is relatively new. The hybrid key setup is done according to the 'Concatenate hybrid key agreement scheme' of ETSI TS 103 744 V1.1.1 (ETSI is a European Standards Organization (ESO). .. the recognized regional standards body dealing with telecommunications, broadcasting and other electronic communications networks and services.)

Features:


Email encryption software

Main Window:

Main Window

Email Composing Window:

Compose New Email